'The correct way'
http://crackstation.net/hashing-security.htm
The article describes using 'slow' encryption, to foil hackers. For a much older system I wrote, I just put in a incremental delay for each incorrect password.
Good article on Salted Password Hashing
- RichAlgeni
- Addict
- Posts: 935
- Joined: Wed Sep 22, 2010 1:50 am
- Location: Bradenton, FL
Re: Good article on Salted Password Hashing
Thanks.
Is a native SHA256 hash planned for PB?
I know there are some ASM versions posted here and the German forum.
Is a native SHA256 hash planned for PB?
I know there are some ASM versions posted here and the German forum.
The nice thing about standards is there are so many to choose from. ~ Andrew Tanenbaum
- RichAlgeni
- Addict
- Posts: 935
- Joined: Wed Sep 22, 2010 1:50 am
- Location: Bradenton, FL
Re: Good article on Salted Password Hashing
I've used the assembler version from the fine folks who haunt the Assembler forum.
-
- Enthusiast
- Posts: 252
- Joined: Mon Aug 16, 2010 4:29 am
Re: Good article on Salted Password Hashing
Interesting article. Thanks. I have always wondered why wrong password entry was so often followed by a simple "Try Again".
Failure should be the trigger to introduce slow methods such as a CAPTCHA code before the next guess.
Failure should be the trigger to introduce slow methods such as a CAPTCHA code before the next guess.